Results

By type

          2022-07-03 03:24:15,684 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.
2022-07-03 03:24:16,728 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory.

  .   ____          _            __ _ _
 /\\ / ___'_ __ _ _(_)_ __  __ _ \ \ \ \
( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \
 \\/  ___)| |_)| | | | | || (_| |  ) ) ) )
  '  |____| .__|_| |_|_| |_\__, | / / / /
 =========|_|==============|___/=/_/_/_/
 :: Spring Boot ::                (v2.5.8)

2022-07-03 03:24:17.488  INFO 1 [           main] o.s.b.SpringApplication                  : No active profile set, falling back to default profiles: default
Jul 03, 2022 3:24:19 AM org.apache.coyote.AbstractProtocol init
INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"]
Jul 03, 2022 3:24:19 AM org.apache.catalina.core.StandardService startInternal
INFO: Starting service [Tomcat]
Jul 03, 2022 3:24:19 AM org.apache.catalina.core.StandardEngine startInternal
INFO: Starting Servlet engine: [Apache Tomcat/9.0.56]
Jul 03, 2022 3:24:19 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring embedded WebApplicationContext
2022-07-03 03:24:19.961 DEBUG 1 [           main] o.j.l.LoggerProviders                    : Logging Provider: org.jboss.logging.Log4j2LoggerProvider
2022-07-03 03:24:20.236  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : Loading initial configuration
2022-07-03 03:24:20.385  INFO 1 [           main] o.o.o.c.c.c.CmpServersConfig             : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json
2022-07-03 03:24:21.117 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReloadConfigController:
	{GET [/reload], produces [application/json]}: reloadConfiguration()
2022-07-03 03:24:21.120 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.CertificationController:
	{GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String)
	{GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String)
2022-07-03 03:24:21.121 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.o.o.c.a.ReadinessController:
	{GET [/ready], produces [application/json]}: checkReady()
2022-07-03 03:24:21.124 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.b.a.w.s.e.BasicErrorController:
	{ [/error]}: error(HttpServletRequest)
	{ [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse)
2022-07-03 03:24:21.165 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.a.OpenApiResource:
	{GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String)
	{GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String)
2022-07-03 03:24:21.170 DEBUG 1 [           main] o.s.w.s.h.AbstractHandlerMethodMapping   : 
	o.s.u.SwaggerWelcome:
	{GET [/docs]}: redirectToUi(HttpServletRequest)
	{GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest)
2022-07-03 03:24:21.288 DEBUG 1 [           main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {}
2022-07-03 03:24:21.967 DEBUG 1 [           main] o.s.w.s.h.SimpleUrlHandlerMapping        : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]}
Jul 03, 2022 3:24:22 AM org.apache.coyote.AbstractProtocol start
INFO: Starting ProtocolHandler ["https-jsse-nio-8443"]
2022-07-03 03:24:22.867  INFO 1 [           main] o.s.b.StartupInfoLogger                  : Started CertServiceApplication in 8.257 seconds (JVM running for 10.652)
Jul 03, 2022 3:24:47 AM org.apache.catalina.core.ApplicationContext log
INFO: Initializing Spring DispatcherServlet 'dispatcherServlet'
2022-07-03 03:25:15.730  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-03 03:25:15.740 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-03 03:25:15.781 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-07-03 03:25:15.786 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-03 03:25:15.806  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] }
2022-07-03 03:25:15.809  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-03 03:25:15.810  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-03 03:25:15.811 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-03 03:25:15.811 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-03 03:25:15.815 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-03 03:25:15.820 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-03 03:25:15.823 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-03 03:25:15.874 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-03 03:25:15.880 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-03 03:25:15.884 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-03 03:25:15.887 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-03 03:25:16.395  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-03 03:25:16.398  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-03 03:25:16.398 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-03 03:25:16.400 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-03 03:25:16.417  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-03 03:25:16.418  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-03 03:25:16.419 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 03:25:16.420 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 03:25:16.420 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 03:25:16.434 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 03:25:16.435 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 03:25:16.435 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 03:25:16.442 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 03:25:16.443 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 03:25:16.443 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 03:25:16.446 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-03 03:25:16.473 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 38461858748281934728197126656705059776382771802
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jul 03 03:22:07 UTC 2022
           Final Date: Fri Jul 02 03:22:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cd:6e:57:d7:f1:a3:ec:54:3c:5b:7d:5b:5f:c0:94:bf:2d:76:6a:d7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ac0c4a69d2de50a06452cf73691b56bde7909bab
                       79446b0013753591944bdb83855428a496588c78
                       cf1b038c5483066576e259d61796f3913a787f91
                       c1398af1dd6faed9f83952e470fc0f3e7d1ca744
                       048bac9fa36762e39ebdf312114067da223642f0
                       b94c52f1ad5953963908279f1e208fead22c273e
                       b594d8b0ddcd2ccecee53805637830169e4ad985
                       78964a65a864e0869acc8275ac54c2f9ad4cdb4c
                       63e698f752f6bc2609857ca612d491f614445d98
                       6d6bd9a39a303a7dfad176777f42a29a0fe213a7
                       15f24666af5ee3c10e36d98cd1ebb2ea8d820aed
                       3a1a6adb53216406d43a51bbd26992a48530f71b
                       64c48c48636a5b0680ef993b71839c4afc34253f
                       6c1b801e9ae237bbcae47b77cc184f8ba63cf115
                       ba3dd8ee6e6460d9940718bb234b95cf42fd8755
                       7bae23e21137cc84e5b13e56fd829c1a2a225e4a
                       d6ffc2bcfc32c7e7bae9ef3f6ff4fb49d2cc0c9e
                       b7c765c8630674a88c029a9d7082e2ae30b9184c
                       24b3df20c5822c1a2c7117341e14ed6a7dc44baa
                       1cadf7ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ee:99:b8:4e:99:18:86:d1:4a:74:99:36:db:ef:05:4d:4b:93:5e:5d]
            modulus: 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
    public exponent: 10001

] 
2022-07-03 04:49:51.458  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-03 04:49:51.461 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-03 04:49:51.465 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-03 04:49:51.467 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-03 04:49:51.468  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-03 04:49:51.469  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-03 04:49:51.470  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-03 04:49:51.470 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-03 04:49:51.471 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-03 04:49:51.472 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-03 04:49:51.479 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-03 04:49:51.481 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-03 04:49:51.481 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-03 04:49:51.482 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-03 04:49:51.676  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-03 04:49:51.682  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-03 04:49:51.683 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-03 04:49:51.683 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-03 04:49:51.686  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-03 04:49:51.686  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-03 04:49:51.687 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 04:49:51.687 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 04:49:51.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 04:49:51.689 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 04:49:51.690 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 04:49:51.690 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 04:49:51.691 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 04:49:51.692 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 04:49:51.692 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 04:49:51.693 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-03 04:49:51.699 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 38461858748281934728197126656705059776382771802
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jul 03 03:22:07 UTC 2022
           Final Date: Fri Jul 02 03:22:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cd:6e:57:d7:f1:a3:ec:54:3c:5b:7d:5b:5f:c0:94:bf:2d:76:6a:d7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ac0c4a69d2de50a06452cf73691b56bde7909bab
                       79446b0013753591944bdb83855428a496588c78
                       cf1b038c5483066576e259d61796f3913a787f91
                       c1398af1dd6faed9f83952e470fc0f3e7d1ca744
                       048bac9fa36762e39ebdf312114067da223642f0
                       b94c52f1ad5953963908279f1e208fead22c273e
                       b594d8b0ddcd2ccecee53805637830169e4ad985
                       78964a65a864e0869acc8275ac54c2f9ad4cdb4c
                       63e698f752f6bc2609857ca612d491f614445d98
                       6d6bd9a39a303a7dfad176777f42a29a0fe213a7
                       15f24666af5ee3c10e36d98cd1ebb2ea8d820aed
                       3a1a6adb53216406d43a51bbd26992a48530f71b
                       64c48c48636a5b0680ef993b71839c4afc34253f
                       6c1b801e9ae237bbcae47b77cc184f8ba63cf115
                       ba3dd8ee6e6460d9940718bb234b95cf42fd8755
                       7bae23e21137cc84e5b13e56fd829c1a2a225e4a
                       d6ffc2bcfc32c7e7bae9ef3f6ff4fb49d2cc0c9e
                       b7c765c8630674a88c029a9d7082e2ae30b9184c
                       24b3df20c5822c1a2c7117341e14ed6a7dc44baa
                       1cadf7ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [ad:63:bc:b6:6d:33:14:e9:65:d1:1d:89:6e:61:06:3a:b7:54:89:1b]
            modulus: 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
    public exponent: 10001

] 
2022-07-03 04:51:33.120  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-03 04:51:33.124 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-03 04:51:33.128 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-07-03 04:51:33.130 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-03 04:51:33.130  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] }
2022-07-03 04:51:33.132  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-03 04:51:33.132  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-03 04:51:33.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-03 04:51:33.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-03 04:51:33.134 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-03 04:51:33.143 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-03 04:51:33.145 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-03 04:51:33.145 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-03 04:51:33.145 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-03 04:51:33.289  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-03 04:51:33.290  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-03 04:51:33.290 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-03 04:51:33.291 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-03 04:51:33.295  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-03 04:51:33.296  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-03 04:51:33.296 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 04:51:33.297 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 04:51:33.297 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 04:51:33.298 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 04:51:33.299 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 04:51:33.299 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 04:51:33.300 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 04:51:33.300 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 04:51:33.300 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 04:51:33.302 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-03 04:51:33.307 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 38461858748281934728197126656705059776382771802
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jul 03 03:22:07 UTC 2022
           Final Date: Fri Jul 02 03:22:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cd:6e:57:d7:f1:a3:ec:54:3c:5b:7d:5b:5f:c0:94:bf:2d:76:6a:d7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ac0c4a69d2de50a06452cf73691b56bde7909bab
                       79446b0013753591944bdb83855428a496588c78
                       cf1b038c5483066576e259d61796f3913a787f91
                       c1398af1dd6faed9f83952e470fc0f3e7d1ca744
                       048bac9fa36762e39ebdf312114067da223642f0
                       b94c52f1ad5953963908279f1e208fead22c273e
                       b594d8b0ddcd2ccecee53805637830169e4ad985
                       78964a65a864e0869acc8275ac54c2f9ad4cdb4c
                       63e698f752f6bc2609857ca612d491f614445d98
                       6d6bd9a39a303a7dfad176777f42a29a0fe213a7
                       15f24666af5ee3c10e36d98cd1ebb2ea8d820aed
                       3a1a6adb53216406d43a51bbd26992a48530f71b
                       64c48c48636a5b0680ef993b71839c4afc34253f
                       6c1b801e9ae237bbcae47b77cc184f8ba63cf115
                       ba3dd8ee6e6460d9940718bb234b95cf42fd8755
                       7bae23e21137cc84e5b13e56fd829c1a2a225e4a
                       d6ffc2bcfc32c7e7bae9ef3f6ff4fb49d2cc0c9e
                       b7c765c8630674a88c029a9d7082e2ae30b9184c
                       24b3df20c5822c1a2c7117341e14ed6a7dc44baa
                       1cadf7ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [43:7d:1f:47:6c:a2:96:24:af:5f:29:5d:49:9d:6a:99:63:40:28:a8]
            modulus: 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
    public exponent: 10001

] 
2022-07-03 04:52:32.859  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-03 04:52:32.861 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-03 04:52:32.863 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-07-03 04:52:32.864 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-03 04:52:32.865  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] }
2022-07-03 04:52:32.866  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-03 04:52:32.867  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-03 04:52:32.867 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-03 04:52:32.868 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-03 04:52:32.868 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-03 04:52:32.873 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-03 04:52:32.874 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-03 04:52:32.874 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-03 04:52:32.875 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-03 04:52:32.998  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-03 04:52:32.999  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-03 04:52:32.999 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-03 04:52:33.000 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-03 04:52:33.002  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-03 04:52:33.003  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-03 04:52:33.003 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 04:52:33.004 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 04:52:33.005 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 04:52:33.006 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 04:52:33.006 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 04:52:33.007 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 04:52:33.008 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 04:52:33.008 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 04:52:33.008 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 04:52:33.010 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-03 04:52:33.015 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 38461858748281934728197126656705059776382771802
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jul 03 03:22:07 UTC 2022
           Final Date: Fri Jul 02 03:22:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cd:6e:57:d7:f1:a3:ec:54:3c:5b:7d:5b:5f:c0:94:bf:2d:76:6a:d7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ac0c4a69d2de50a06452cf73691b56bde7909bab
                       79446b0013753591944bdb83855428a496588c78
                       cf1b038c5483066576e259d61796f3913a787f91
                       c1398af1dd6faed9f83952e470fc0f3e7d1ca744
                       048bac9fa36762e39ebdf312114067da223642f0
                       b94c52f1ad5953963908279f1e208fead22c273e
                       b594d8b0ddcd2ccecee53805637830169e4ad985
                       78964a65a864e0869acc8275ac54c2f9ad4cdb4c
                       63e698f752f6bc2609857ca612d491f614445d98
                       6d6bd9a39a303a7dfad176777f42a29a0fe213a7
                       15f24666af5ee3c10e36d98cd1ebb2ea8d820aed
                       3a1a6adb53216406d43a51bbd26992a48530f71b
                       64c48c48636a5b0680ef993b71839c4afc34253f
                       6c1b801e9ae237bbcae47b77cc184f8ba63cf115
                       ba3dd8ee6e6460d9940718bb234b95cf42fd8755
                       7bae23e21137cc84e5b13e56fd829c1a2a225e4a
                       d6ffc2bcfc32c7e7bae9ef3f6ff4fb49d2cc0c9e
                       b7c765c8630674a88c029a9d7082e2ae30b9184c
                       24b3df20c5822c1a2c7117341e14ed6a7dc44baa
                       1cadf7ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [23:b4:5a:e3:59:5c:f3:75:fb:33:05:fa:e4:33:e2:6f:d3:72:c9:8e]
            modulus: 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
    public exponent: 10001

] 
2022-07-03 04:54:35.809  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-03 04:54:35.811 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-03 04:54:35.813 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-03 04:54:35.814 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-03 04:54:35.814  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] }
2022-07-03 04:54:35.815  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-03 04:54:35.816  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-03 04:54:35.816 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-03 04:54:35.817 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-03 04:54:35.817 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-03 04:54:35.823 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-03 04:54:35.824 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-03 04:54:35.825 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-03 04:54:35.825 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-03 04:54:36.367  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-03 04:54:36.368  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-03 04:54:36.368 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-03 04:54:36.369 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-03 04:54:36.377  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-03 04:54:36.380  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-03 04:54:36.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 04:54:36.392 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 04:54:36.393 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 04:54:36.407 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 04:54:36.407 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 04:54:36.408 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 04:54:36.409 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 04:54:36.409 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 04:54:36.410 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 04:54:36.411 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-03 04:54:36.415 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 38461858748281934728197126656705059776382771802
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jul 03 03:22:07 UTC 2022
           Final Date: Fri Jul 02 03:22:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cd:6e:57:d7:f1:a3:ec:54:3c:5b:7d:5b:5f:c0:94:bf:2d:76:6a:d7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ac0c4a69d2de50a06452cf73691b56bde7909bab
                       79446b0013753591944bdb83855428a496588c78
                       cf1b038c5483066576e259d61796f3913a787f91
                       c1398af1dd6faed9f83952e470fc0f3e7d1ca744
                       048bac9fa36762e39ebdf312114067da223642f0
                       b94c52f1ad5953963908279f1e208fead22c273e
                       b594d8b0ddcd2ccecee53805637830169e4ad985
                       78964a65a864e0869acc8275ac54c2f9ad4cdb4c
                       63e698f752f6bc2609857ca612d491f614445d98
                       6d6bd9a39a303a7dfad176777f42a29a0fe213a7
                       15f24666af5ee3c10e36d98cd1ebb2ea8d820aed
                       3a1a6adb53216406d43a51bbd26992a48530f71b
                       64c48c48636a5b0680ef993b71839c4afc34253f
                       6c1b801e9ae237bbcae47b77cc184f8ba63cf115
                       ba3dd8ee6e6460d9940718bb234b95cf42fd8755
                       7bae23e21137cc84e5b13e56fd829c1a2a225e4a
                       d6ffc2bcfc32c7e7bae9ef3f6ff4fb49d2cc0c9e
                       b7c765c8630674a88c029a9d7082e2ae30b9184c
                       24b3df20c5822c1a2c7117341e14ed6a7dc44baa
                       1cadf7ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [f4:76:fb:ca:d0:1f:af:60:96:1f:8a:aa:6b:fd:7a:47:92:fa:ae:2e]
            modulus: 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
    public exponent: 10001

] 
2022-07-03 05:03:11.977  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-03 05:03:11.981 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-03 05:03:11.984 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-07-03 05:03:11.986 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-03 05:03:11.987  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] }
2022-07-03 05:03:11.988  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-03 05:03:11.989  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-03 05:03:11.989 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-03 05:03:11.990 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-03 05:03:11.991 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-03 05:03:12.000 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-03 05:03:12.002 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-03 05:03:12.002 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-03 05:03:12.003 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-03 05:03:12.140  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-03 05:03:12.141  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-03 05:03:12.142 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-03 05:03:12.142 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-03 05:03:12.144  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-03 05:03:12.144  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-03 05:03:12.145 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 05:03:12.145 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 05:03:12.145 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 05:03:12.146 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 05:03:12.146 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 05:03:12.147 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 05:03:12.148 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 05:03:12.148 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 05:03:12.148 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 05:03:12.149 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-03 05:03:12.154 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 38461858748281934728197126656705059776382771802
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jul 03 03:22:07 UTC 2022
           Final Date: Fri Jul 02 03:22:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cd:6e:57:d7:f1:a3:ec:54:3c:5b:7d:5b:5f:c0:94:bf:2d:76:6a:d7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ac0c4a69d2de50a06452cf73691b56bde7909bab
                       79446b0013753591944bdb83855428a496588c78
                       cf1b038c5483066576e259d61796f3913a787f91
                       c1398af1dd6faed9f83952e470fc0f3e7d1ca744
                       048bac9fa36762e39ebdf312114067da223642f0
                       b94c52f1ad5953963908279f1e208fead22c273e
                       b594d8b0ddcd2ccecee53805637830169e4ad985
                       78964a65a864e0869acc8275ac54c2f9ad4cdb4c
                       63e698f752f6bc2609857ca612d491f614445d98
                       6d6bd9a39a303a7dfad176777f42a29a0fe213a7
                       15f24666af5ee3c10e36d98cd1ebb2ea8d820aed
                       3a1a6adb53216406d43a51bbd26992a48530f71b
                       64c48c48636a5b0680ef993b71839c4afc34253f
                       6c1b801e9ae237bbcae47b77cc184f8ba63cf115
                       ba3dd8ee6e6460d9940718bb234b95cf42fd8755
                       7bae23e21137cc84e5b13e56fd829c1a2a225e4a
                       d6ffc2bcfc32c7e7bae9ef3f6ff4fb49d2cc0c9e
                       b7c765c8630674a88c029a9d7082e2ae30b9184c
                       24b3df20c5822c1a2c7117341e14ed6a7dc44baa
                       1cadf7ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fc:43:b4:2d:4d:ee:c5:42:5d:a8:10:20:ed:64:53:c4:55:d0:89:c5]
            modulus: c8ca2d94c0f93e23090b3fe4dffbd1327eb0d49d0ce37295bd61ba9f55ff031fb790d9c8f86b5787055d758945739b294e7f44f08aabeb7d8018fc02cabc13e08a57ba65590fc6049cb01b72b71cb7db4b255df43857be2304dc68c5ee91696c9874c5aa0ab6555264ddfcfe13ec90c925c3d69b851ee964a69bd829447084aded14009df1aaa0060ea2a7e3411da64bfb708d6ba8cf7f265ec0ddf80d2164e0f1e0a0e7ca50f4cbf2f45b738f78a4d1a41ab1354218b426d8dd8f247b44f501a0c7bd85f5a36d7bb39706c7c5871717dd0bf745147bdcc139d8531cd9c8cc6d36d4cfd296546857b3231b6a2787323df0e8d55c89f6fa496e96a62def201601
    public exponent: 10001

] 
2022-07-03 05:08:00.970  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-03 05:08:00.974 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-03 05:08:00.977 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-07-03 05:08:00.978 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-03 05:08:00.979  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] }
2022-07-03 05:08:00.979  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-03 05:08:00.980  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-03 05:08:00.980 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-03 05:08:00.981 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-03 05:08:00.982 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-03 05:08:00.988 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-03 05:08:00.989 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-03 05:08:00.990 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-03 05:08:00.990 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-03 05:08:01.123  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-03 05:08:01.124  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-03 05:08:01.124 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-03 05:08:01.125 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-03 05:08:01.126  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-03 05:08:01.127  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-03 05:08:01.128 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 05:08:01.128 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 05:08:01.129 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 05:08:01.130 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 05:08:01.130 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 05:08:01.130 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 05:08:01.131 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 05:08:01.132 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 05:08:01.132 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 05:08:01.133 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-03 05:08:01.137 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 38461858748281934728197126656705059776382771802
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jul 03 03:22:07 UTC 2022
           Final Date: Fri Jul 02 03:22:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cd:6e:57:d7:f1:a3:ec:54:3c:5b:7d:5b:5f:c0:94:bf:2d:76:6a:d7]
            modulus: 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
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ac0c4a69d2de50a06452cf73691b56bde7909bab
                       79446b0013753591944bdb83855428a496588c78
                       cf1b038c5483066576e259d61796f3913a787f91
                       c1398af1dd6faed9f83952e470fc0f3e7d1ca744
                       048bac9fa36762e39ebdf312114067da223642f0
                       b94c52f1ad5953963908279f1e208fead22c273e
                       b594d8b0ddcd2ccecee53805637830169e4ad985
                       78964a65a864e0869acc8275ac54c2f9ad4cdb4c
                       63e698f752f6bc2609857ca612d491f614445d98
                       6d6bd9a39a303a7dfad176777f42a29a0fe213a7
                       15f24666af5ee3c10e36d98cd1ebb2ea8d820aed
                       3a1a6adb53216406d43a51bbd26992a48530f71b
                       64c48c48636a5b0680ef993b71839c4afc34253f
                       6c1b801e9ae237bbcae47b77cc184f8ba63cf115
                       ba3dd8ee6e6460d9940718bb234b95cf42fd8755
                       7bae23e21137cc84e5b13e56fd829c1a2a225e4a
                       d6ffc2bcfc32c7e7bae9ef3f6ff4fb49d2cc0c9e
                       b7c765c8630674a88c029a9d7082e2ae30b9184c
                       24b3df20c5822c1a2c7117341e14ed6a7dc44baa
                       1cadf7ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [be:83:e3:2c:e8:ab:ae:a3:be:9c:67:0c:f2:0d:c5:32:58:d9:55:b2]
            modulus: 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
    public exponent: 10001

] 
2022-07-03 05:08:25.795  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController        : Received certificate initialization request for CA named: RA
2022-07-03 05:08:25.796 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object
2022-07-03 05:08:25.797 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: 
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-07-03 05:08:25.798 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: 
Cmpv2Server{authentication=Authentication{  iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'}
2022-07-03 05:08:25.799  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request:
CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] }
2022-07-03 05:08:25.799  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validate before creating Certificate Request for CA: RA
2022-07-03 05:08:25.800  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Validation completed successfully.
2022-07-03 05:08:25.800 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random integer
2022-07-03 05:08:25.801 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Extensions from Subject Alternative Names
2022-07-03 05:08:25.801 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper             : Generating Optional Validity from Date objects
2022-07-03 05:08:25.806 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating a Pki Header Builder
2022-07-03 05:08:25.806 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-03 05:08:25.807 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating random array of bytes
2022-07-03 05:08:25.807 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-03 05:08:25.954  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Received response from Server
2022-07-03 05:08:25.955  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Response type is: INIT_REP 
2022-07-03 05:08:25.955 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Verifying signature of the response.
2022-07-03 05:08:25.956 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil                      : Generating array of bytes representing PkiHeader and PkiBody
2022-07-03 05:08:25.957  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator    : Response status code: 0
2022-07-03 05:08:25.958  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl                : Verifying certificates returned as part of CertResponse.
2022-07-03 05:08:25.958 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 05:08:25.958 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 05:08:25.959 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 05:08:25.960 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 05:08:25.960 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 05:08:25.960 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 05:08:25.961 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Retrieving certificate of type class java.security.cert.X509Certificate from byte array.
2022-07-03 05:08:25.962 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Parsing X509Certificate from bytes with provider BC
2022-07-03 05:08:25.962 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Creating certificate Factory to generate certificate using provider BC
2022-07-03 05:08:25.963 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
2022-07-03 05:08:25.966 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper            : Certificate verify result:PKIXCertPathValidatorResult: [
  Trust Anchor: [
  Trusted CA cert:   [0]         Version: 3
         SerialNumber: 38461858748281934728197126656705059776382771802
             IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Start Date: Sun Jul 03 03:22:07 UTC 2022
           Final Date: Fri Jul 02 03:22:06 UTC 2032
            SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart
           Public Key: RSA Public Key [cd:6e:57:d7:f1:a3:ec:54:3c:5b:7d:5b:5f:c0:94:bf:2d:76:6a:d7]
            modulus: bd559b43fec19a47e92e0dbc5fac7b00f0aa07353abaa8595a8e8e2468031b5b7b4e3595189a00d6f7eef0a9ba0e335063c9d6989b7f81c914c625441596b87c7ec67decd6f741a22bf188a3b9a3ca0f88f90db6f09dac49caa13e59b7ccce799f5811dc95b386bf6bf2a100ae84914cca6409562f59918e3b5f201ecca6f8ccc79fc4fb9411249bb283c20a2333740617b055e73d5054de4478149a0d11b02f5790939811f0f1a8fb21eec6c8c1720b21d14233ffe85e8bcba98846a6f525f13c33105215488bf77adf67b290b4ce371b2472fc3ff14cacc38bbbdedbf3d4359b4ba29106739b0bcdbdf9fe0ac4e55cfcd479ee921a5bd93b44d615833a836f0586e0cc0c8a425df2ff36cb591cbdec558574c5ee7c97ffa3330abd07aa14ebbffb31a2f622335dd8b6aa4af2961b36e7c5ad8add5d348c69b865954662c76702116f8ca475da626814d1911dbcb76cbee392c086fb29c6e0a3d19dc287b2bd5bcd5f3b70b88ac14757403fc8063649a3713cf4906510d2298a582b2b859947
    public exponent: 10001

  Signature Algorithm: SHA256WITHRSA
            Signature: ac0c4a69d2de50a06452cf73691b56bde7909bab
                       79446b0013753591944bdb83855428a496588c78
                       cf1b038c5483066576e259d61796f3913a787f91
                       c1398af1dd6faed9f83952e470fc0f3e7d1ca744
                       048bac9fa36762e39ebdf312114067da223642f0
                       b94c52f1ad5953963908279f1e208fead22c273e
                       b594d8b0ddcd2ccecee53805637830169e4ad985
                       78964a65a864e0869acc8275ac54c2f9ad4cdb4c
                       63e698f752f6bc2609857ca612d491f614445d98
                       6d6bd9a39a303a7dfad176777f42a29a0fe213a7
                       15f24666af5ee3c10e36d98cd1ebb2ea8d820aed
                       3a1a6adb53216406d43a51bbd26992a48530f71b
                       64c48c48636a5b0680ef993b71839c4afc34253f
                       6c1b801e9ae237bbcae47b77cc184f8ba63cf115
                       ba3dd8ee6e6460d9940718bb234b95cf42fd8755
                       7bae23e21137cc84e5b13e56fd829c1a2a225e4a
                       d6ffc2bcfc32c7e7bae9ef3f6ff4fb49d2cc0c9e
                       b7c765c8630674a88c029a9d7082e2ae30b9184c
                       24b3df20c5822c1a2c7117341e14ed6a7dc44baa
                       1cadf7ed
       Extensions: 
                       critical(true) BasicConstraints: isCa(true)
                       critical(false) 2.5.29.35 value = Sequence
    Tagged [0] IMPLICIT 
        DER Octet String[20] 

                       critical(false) 2.5.29.14 value = DER Octet String[20] 

                       critical(true) KeyUsage: 0x86


  Policy Tree: null
  Subject Public Key: RSA Public Key [fd:bf:92:bc:4f:f0:da:2f:70:40:19:ca:ed:5a:b6:cc:e2:68:22:ea]
            modulus: 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
    public exponent: 10001

]